Patent classifications
G06Q20/38215
Systems and methods for cost altering payment services
Cost altering payment services (“CAPS”) system in association with a distributed enhanced payment (“DEP”) processing system includes a merchant point of sale (“POS”) terminal system and a remote enhanced payment management system (“EPMS”). The remote EPMS receives payment transactions including additional risk mitigating payment transaction (“RMPT”) information and based on that additional RMPT information provides altered transaction costs. The remote EPMS provides facilities for the merchant to review and revise payment management services so as to utilize additional RMPT information received from the merchant POS terminal system so as to alter transaction costs. Such facilities provide information to determine the relative potential transaction cost benefits of various payment management service sets utilizing cost profiles that represent the costs of archival, recorded and projected future transactions. The remote EPMS provides “transaction guidance” technology to be utilized by the merchant's POS terminal system to facilitate prompting for and acquiring additional RMPT information.
MULTI-FACTOR AUTHENTICATION (MFA) ARRANGEMENTS FOR DYNAMIC VIRTUAL TRANSACTION TOKEN GENERATION VIA BROWSER EXTENSION
Arrangements requiring additional multi-factor authentication (MFA) in certain instances of dynamic virtual transaction token (e.g., virtual credit card token) generation via a browser extension.
SYSTEMS AND METHODS FOR PREVENTING THE FRAUDULENT SENDING OF DATA FROM A COMPUTER APPLICATION TO A MALICIOUS THIRD PARTY
Systems and methods for preventing the fraudulent sending of data from a computer application to a malicious third party are disclosed. In one embodiment, a method for preventing a computer application from sending data to an unauthorized website may include: (1) receiving, at a computer application executed by an electronic device and from a first website, an identification of a second website for receiving data from the computer application; (2) providing, by the computer application and to a certificate authority, the identification of the second website, wherein the certificate authority validates that the second website is on a list of allowed websites for the first website; (3) receiving, by the computer application and from the certificate authority, validation; and (4) communicating, by the computer application, the data to the second website.
SYSTEM AND METHOD FOR MONETIZING ASSETS
The present invention provides a method and system for monetizing a physical asset owned by a seller using an Internet-based platform accessible via a website interface configured to facilitate a transaction between a buyer and the seller, the method comprising the steps of identifying an asset, dividing at least a portion of the asset into one or more shares, and determining a monetary value of each share; submitting the one or more shares for verification by a third party verifier; posting an opportunity for a buyer to acquire a share according to terms and conditions as described in a smart contract, the opportunity being posted by the seller via a seller interface on the website; if the terms and conditions of the smart contract are accepted, an offer for payment is entered by the buyer via a buyer interface. If each available opportunity receives an offer for payment, the offers for payment are accepted by the seller via a seller interface to implement the smart contract and transfer a respective share in the asset to the respective buyer and the transaction is validated by a third party validator and recorded on the blockchain. The terms and conditions described in the smart contract include the monetary value of the share of the asset and the time period for which the share of the asset is held by the buyer, and at the end of the time period, the share of the asset is liquidated by the buyer at an appraised market value as determined at that time.
SYSTEMS AND METHODS FOR CONSENSUS-BASED ACCESS CONTROL FOR SMART CONTRACT FUNCTIONS
Systems and methods to at least provide access control for execution of smart contract functions (methods) through consensus mechanisms are disclosed. A first smart contract is stored on a blockchain network. During execution, the first smart contract performs operations that include: aggregating a threshold number of signed blockchain transactions from authorized blockchain addresses, receiving a set of signed blockchain transactions calling a function of a target smart contract from a set of blockchain addresses, verifying that each blockchain address of the set of authorized blockchain addresses is authorized to make the call, and calling the function of the target smart contract when a number of signed blockchain transactions calling the function exceeds a threshold number.
TRANSACTION CONFIGURATION USING CRYPTOGRAPHIC AUTHENTICATION
A cryptographic scheme associated with a transaction service is received at a first computer system. Subsequent to receiving the cryptographic schema, the first computer system performs a configuration process for a transaction to be performed with the transaction service. The configuration process includes receiving a request for transaction configuration information from a client device. The request includes a cryptographic token generated by a second computer system the transaction service. The first computer system determines whether to grant the request based on analyzing the cryptographic token according to the cryptographic schema. Based on the determining, the first computer system sends transaction configuration information. The configuration process is performed by first computer system independent of communication between the second computer system and the first computer system.
System and method for a decentralized portable information container supporting privacy protected digital information credentialing, remote administration, local validation, access control and remote instruction signaling utilizing blockchain distributed ledger and container wallet technologies
A mechanism for privacy protected, portable and decentralized credentialed information issuance, lifecycle administration and access control supporting autonomously verifiable issuer attestation and provenance using blockchain distributed ledger technology. The embodied invention makes unauthorized tampering with credentialed information transparently detectable using local edge validation requiring only the execution of cryptographic libraries as found within the normative Bitcoin Core or equivalent blockchain implementation. The invention prevents unauthorized access, unregulated copy distribution, and orphaned ownership lacking issuer provenance as demonstrated in identity theft. The preferred embodiment provides the foundational capability of tamper resistant content leveraging modification detectable digital information credentialing, remote administration, localized independent state validation, distributed access control, metadata enrichment, application eventing and decentralized processing instruction signaling. The foundational aspect of the preferred embodiment directs authorized credentialed information issuers to persist, store and distribute information content hosted within cryptographically secure blockchain client “container-wallets”.
SYSTEM AND METHOD UTILIZING CHAIN OF TRUST
Embodiments of the invention are directed to systems and methods for authenticating a user device using an authenticating device that has previously been associated with a user and/or a credential. The user may initiate a transaction at the user device. An authenticating device associated with the transaction may be sent an authentication request corresponding to the user device. The user may indicate whether or not the user device is authenticated utilizing the authenticating device. If the user device is authenticated, the transaction may proceed. If the user device is not authenticated the transaction may be rejected.
SECURE CONTACTLESS CREDENTIAL EXCHANGE
In some implementations, a credential device may receive a request to generate a virtual credential from a user device associated with a first unique identifier, wherein the request includes a second unique identifier associated with a terminal to receive the virtual credential. The credential device may generate the virtual credential based on the request and a primary credential associated with the first unique identifier, wherein the virtual credential is associated with the primary credential and valid only for an entity associated with the terminal. The credential device may transmit information associated with the virtual credential to the terminal associated with the second unique identifier.
Method and System of Authenticating a Payment Transaction Using a User Device
A method and system for authenticating a payment transaction. The method includes receiving a request for verifying a phone number associated with a Subscriber Identification Module card from a merchant application installed in the user device. Further, obtaining a first key from at least one of a server associated with a manufacturer of the user device and a network server. Furthermore, generating a first cryptogram based on at least one of the phone number and a unique identification value associated with the user device using the first key, wherein the first cryptogram is provided to the server associated with the manufacturer for verification. Upon verification of the first cryptogram, the method includes receiving a second cryptogram from the server associated with the manufacturer, wherein the merchant application provides the second cryptogram and payment transaction details to an issuer server for authentication of the payment transaction.